October 2023

Protect yourself against digital draculas this Halloween: Avoid AI-driven cyber trickery

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or inf...

Sp123 31 Oct, 2023

Unmasking the Tricksters: The World of Fake Browser Updates

How can you tell when a website (yes, a website) is compromised? These threats are pretty crafty because they aren’t out to target specific ...

Sp123 31 Oct, 2023

Le nuove opportunità dell’AI: sfruttare GPT 3.5 per la deoffuscazione del codice

Usare l’IA per ricostruire il codice originale dal codice deoffuscato è senz’altro un ramo di ricerca da esplorare. Questo esperimento con G...

Sp123 30 Oct, 2023

'Accidental' malvertising via Dynamic Search Ads delivers malware frenzy

Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally creating on...

Sp123 30 Oct, 2023

Warning Against Cisco IOS XE Software Web UI Vulnerabilities (CVE-2023-20198, CVE-2023-20273)

Overview This month, Cisco released a security advisory regarding two vulnerabilities currently being actively exploited in actual attacks:...

Sp123 30 Oct, 2023

ISC Stormcast For Monday, October 30th, 2023 https://ift.tt/Aw0Yjmu, (Mon, Oct 30th)

Article Link: https://isc.sans.edu/diary/rss/30356 1 post - 1 participant Read full topic Malware Analysis, News and Indicators - Lates...

Sp123 30 Oct, 2023

Netsupport Intrusion Results in Domain Compromise

NetSupport Manager is one of the oldest third-party remote access tools still currently on the market with over 33 years of history. This is...

Sp123 30 Oct, 2023

Spam or Phishing? Looking for Credentials & Passwords, (Sun, Oct 29th)

We are now at the end of the Cybersecurity Awareness month, it is important to remain digitally safe all year round [1][2][3]. Article Link...

Sp123 29 Oct, 2023

Size Matters for Many Security Controls, (Sat, Oct 28th)

This week, I’m teaching FOR610 in Manchester, and while my students are busy resolving some challenges, I’m looking at my hunting results fr...

Sp123 28 Oct, 2023

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can...

Sp123 27 Oct, 2023

Ensuring robust security of a containerized environment

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or inf...

Sp123 26 Oct, 2023

A malicious code found: New Magecart Campaign That’s Abusing 404 Pages

Magecart is a term used to describe a type of cyberattack that targets online retailers by injecting malicious code into their websites and ...

Sp123 26 Oct, 2023

What is Cyber Threat Intelligence

Cyber Threat Intelligence (CTI) — often referred to as “Threat Intelligence” or “Threat Intel” — is the practice of gathering and analyzing ...

Sp123 26 Oct, 2023

Our vision: Securing the entire software supply chain

The use of open-source software has quickly exposed all parts of the software development process as part of the overall attack surface, an...

Sp123 25 Oct, 2023